Information Technology & Cyber Laws 6
#1

*Virtual memory is an imaginary memory area supported by some operating systems.

*The process of translating virtual address to physical address is known as - Mapping

Extra Info 
Access time
*The time required to reach a particular storage location and obtain its content in a disk is called Access time Seek time
*The average time takes to move read / write head to a particular track on a disk.

Latency Time
*In general, it is the time between initiating a request in the computer and receiving the answer.

BASIC INFO
*1 Nibble - 4 bits
*1 Byte - 8 bits
*1 KB - 1024 Bytes ≈ 1000 bytes
*1 MB - 1024 KB ≈ 1 million bytes
*1 GB - 1024 MB ≈ 1 billion bytes
*1 TB - 1024 GB  ≈  1 Trillion bytes 

*All buses consist of two parts. They are - Address bus and data bus.
*Set of wires which is used to transfer the address of specific memory locations  
Ans : Address bus
*Set of wires that provides transportation of data
Ans : Data bus
*Data bus transfers actual data.
*Bus that connects CPU to RAM (main memory) on the motherboard is known as
Ans : System bus
*Set of wires used to transmit signals to control the operation of various units of a computer is called
Ans : Control bus 
*The component which routes data between the computer buses is known as
Ans : Chipset


Measurement of Memory
*The smallest unit of memory is bit.
*Bit is the short form of binary digit
*The speed of a hard disc is measured in 
Ans : Revolutions Per Minute (RPM)
*Memory of a computer is usually measured in
Ans : Bytes
*The storage capacity of a hard disc is measured in Megabytes, Gigabytes & Terabytes.
*1 bit is one or zero (1 or 0)
*Half byte is known as - nibble
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology & Cyber Laws 36 amrutha735 0 482 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 35 amrutha735 0 430 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 34 amrutha735 0 444 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 33 amrutha735 0 500 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 32 amrutha735 0 435 26-12-2017, 10:42 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 31 amrutha735 0 461 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 30 amrutha735 0 513 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 29 amrutha735 0 442 26-12-2017, 10:41 AM
Last Post: amrutha735
  Information Technology & Cyber Laws 28 amrutha735 0 499 23-12-2017, 04:34 PM
Last Post: amrutha735
  Information Technology & Cyber Laws 27 amrutha735 0 501 23-12-2017, 04:33 PM
Last Post: amrutha735

Forum Jump: